This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)
☆30Jul 22, 2024Updated last year
Alternatives and similar repositories for AIM-Interrupt-Modeling
Users that are interested in AIM-Interrupt-Modeling are comparing it to the libraries listed below
Sorting:
- Unit test firmware evaluated in P2IM paper☆11Jul 2, 2021Updated 4 years ago
- Source code of SEmu-Fuzz☆22Nov 30, 2024Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- Real firmware fuzz-tested in P2IM paper☆24Dec 11, 2020Updated 5 years ago
- A Specification-Guided Approach for Firmware Emulation☆44Apr 22, 2025Updated 10 months ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 6 years ago
- ☆20Dec 4, 2023Updated 2 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Jun 1, 2024Updated last year
- ☆32Jul 22, 2023Updated 2 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- ☆37May 11, 2022Updated 3 years ago
- Repository for monolithic firmware blobs☆89Mar 10, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Can bus to Ethernet Converter Using Arduino Uno☆11Jun 5, 2024Updated last year
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated 11 months ago
- ☆94Mar 31, 2025Updated 11 months ago
- ☆164Oct 6, 2021Updated 4 years ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- ☆15Feb 18, 2025Updated last year
- fork from A-Protect☆10Nov 26, 2018Updated 7 years ago
- ☆10Sep 25, 2024Updated last year
- ☆10Oct 31, 2022Updated 3 years ago
- A CAN Gateway framework, offering CAN frame-based routing across multiple interfaces and protocols.☆13Jan 29, 2021Updated 5 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- bert蒸馏实践,包含BiLSTM蒸馏BERT和TinyBert☆13Apr 23, 2022Updated 3 years ago
- ☆11Mar 5, 2023Updated 2 years ago
- Electric Vehicle AC Charger Controller☆13Apr 29, 2020Updated 5 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 2 years ago
- Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning☆13Mar 7, 2025Updated 11 months ago
- ☆11Jul 4, 2023Updated 2 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- ☆47Jul 15, 2022Updated 3 years ago
- Arduino firmware for Macchina M2 and SuperB for the Onyx M2 project, allowing CAN bus messages to flow to a web app running on the Tesla …☆13Nov 1, 2021Updated 4 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- 抖音数据采集教程,安卓应用层抓包总结☆15Jan 11, 2021Updated 5 years ago
- C# class for communicating with Peak-System's PCAN-Ethernet Gateway☆13Nov 4, 2020Updated 5 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆16Feb 27, 2025Updated last year
- DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing☆11Feb 28, 2023Updated 3 years ago